at a repository and get human-readable status, history, and tracking
information about the project.
<h3>2.1 Identification Of Artifacts</h3>
A particular version of a particular file is called an "artifact".
Each artifact has a universally unique name which is the
<a href="http://en.wikipedia.org/wiki/SHA">SHA1</a> hash of the content
of that file expressed as 40 characters of lower-case hexadecimal. Such
a hash is referred to as the Artifact Identifier or Artifact ID
for the artifact. The SHA1 algorithm is created with the purpose of
providing a highly forgery-resistant identifier for a file. Given any
file it is simple to find the artifact ID for that file. But given a
artifact ID it is computationally intractable to generate a file that will
have that Artifact ID.

|

77
78
79
80
81
82
83
84
85
86
87
88
89
90
91

at a repository and get human-readable status, history, and tracking
information about the project.
<h3>2.1 Identification Of Artifacts</h3>
A particular version of a particular file is called an "artifact".
Each artifact has a universally unique name which is the
<a href="http://en.wikipedia.org/wiki/SHA1">SHA1</a> hash of the content
of that file expressed as 40 characters of lower-case hexadecimal. Such
a hash is referred to as the Artifact Identifier or Artifact ID
for the artifact. The SHA1 algorithm is created with the purpose of
providing a highly forgery-resistant identifier for a file. Given any
file it is simple to find the artifact ID for that file. But given a
artifact ID it is computationally intractable to generate a file that will
have that Artifact ID.

This page was generated in about
0.006s by
Fossil 2.8 [7b0dbe8079] 2019-02-20 22:28:24